First published: Tue Jan 30 2024(Updated: )
### Impact Nodes and servers get a ssh config by default that permits root login with password authentication. In a proper deployment, the SSH service is not exposed so there is no risk, but not all deployments are ideal. The default should therefore be less permissive. We will probably opt to completely remove the ssh option as it is only used for debugging. Later, we can add a debug mode where we can activate it if necessary. ### Workarounds Remove the ssh part from the docker file and build your own docker image
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/vantage6 | <4.2.0 | 4.2.0 |
Vantage6 | <4.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21653 is considered a moderate severity vulnerability due to the risk of unauthorized root access.
To fix CVE-2024-21653, configure the SSH service to disable root login and use key-based authentication instead.
CVE-2024-21653 affects Vantage6 versions prior to 4.2.0.
Users and administrators of Vantage6 who have not secured their SSH configurations are impacted by CVE-2024-21653.
The potential risks of CVE-2024-21653 include unauthorized access and exploitation of systems due to permissive SSH configurations.